SlideShare a Scribd company logo
Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor
Networks
ABSTRACT:
Ad hoc low-power wireless networks are an exciting research direction in sensing and pervasive
computing. Prior security work in this area has focused primarily on denial of communication at
the routing or medium access control levels. This paper explores resource depletion attacks at
the routing protocol layer, which permanently disable networks by quickly draining nodes’
battery power. These “Vampire” attacks are not specific to any specific protocol, but rather rely
on the properties of many popular classes of routing protocols. We find that all examined
protocols are susceptible to Vampire attacks, which are devastating, difficult to detect, and are
easy to carry out using as few as one malicious insider sending only protocol-compliant
messages. In the worst case, a single Vampire can increase network-wide energy usage by a
factor of O (N), where N in the number of network nodes. We discuss methods to mitigate these
types of attacks, including a new proof-of-concept protocol that provably bounds the damage
caused by Vampires during the packet forwarding phase.
GLOBALSOFT TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
EXISTING SYSTEM:
Existing work on secure routing attempts to ensure that adversaries cannot cause path discovery
to return an invalid network path, but Vampires do not disrupt or alter discovered paths, instead
using existing valid network paths and protocol compliant messages. Protocols that maximize
power efficiency are also inappropriate, since they rely on cooperative node behavior and
cannot optimize out malicious action.
DISADVANTAGES OF EXISTING SYSTEM:
 Power outages
 Due to Environmental disasters, loss in the information
 Lost productivity
 Various DOS attacks
 Secure level is low
 They do not address attacks that affect long-term availability.
PROPOSED SYSTEM:
This paper makes three primary contributions. First, we thoroughly evaluate the vulnerabilities
of existing protocols to routing layer battery depletion attacks. We observe that security
measures to prevent Vampire attacks are orthogonal to those used to protect routing
infrastructure, and so existing secure routing protocols such as Ariadne, SAODV and SEAD do
not protect against Vampire attacks. Existing work on secure routing attempts to ensure that
adversaries cannot cause path discovery to return an invalid network path, but Vampires do not
disrupt or alter discovered paths, instead using existing valid network paths and protocol-
compliant messages. Protocols that maximize power efficiency are also inappropriate, since
they rely on cooperative node behavior and cannot optimize out malicious action. Second, we
show simulation results quantifying the performance of several representative protocols in the
presence of a single Vampire (insider adversary). Third, we modify an existing sensor network
routing protocol to provably bound the damage from Vampire attacks during packet forwarding.
In proposed system we show simulation results quantifying the performance of several
representative protocols in the presence of a single Vampire. Then, we modify an existing
sensor network routing protocol to provably bound the damage from Vampire attacks during
packet forwarding.
ADVANTAGES OF PROPOSED SYSTEM:
 Protect from the vampire attacks
 Secure level is high
 Boost up the Battery power
SYSTEM CONFIGURATION:-
HARDWARE CONFIGURATION:-
 Processor - Pentium –IV
 Speed - 1.1 Ghz
 RAM - 256 MB(min)
 Hard Disk - 20 GB
 Key Board - Standard Windows Keyboard
 Mouse - Two or Three Button Mouse
 Monitor - SVGA
SOFTWARE CONFIGURATION:-
 Operating System : Windows XP
 Programming Language : JAVA
 Java Version : JDK 1.6 & above.
 Database : MYSQL
REFERENCE:
Eugene Y. Vasserman and Nicholas Hopper “Vampire Attacks: Draining Life from
Wireless Ad Hoc Sensor Networks”- IEEE TRANSACTIONS ON MOBILE COMPUTING,
VOL. 12, NO. 2, FEBRUARY 2013.
DOMAIN: WIRELESS NETWORK PROJECTS

More Related Content

Vampire attacks draining life from wireless ad hoc sensor networks

  • 1. Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks ABSTRACT: Ad hoc low-power wireless networks are an exciting research direction in sensing and pervasive computing. Prior security work in this area has focused primarily on denial of communication at the routing or medium access control levels. This paper explores resource depletion attacks at the routing protocol layer, which permanently disable networks by quickly draining nodes’ battery power. These “Vampire” attacks are not specific to any specific protocol, but rather rely on the properties of many popular classes of routing protocols. We find that all examined protocols are susceptible to Vampire attacks, which are devastating, difficult to detect, and are easy to carry out using as few as one malicious insider sending only protocol-compliant messages. In the worst case, a single Vampire can increase network-wide energy usage by a factor of O (N), where N in the number of network nodes. We discuss methods to mitigate these types of attacks, including a new proof-of-concept protocol that provably bounds the damage caused by Vampires during the packet forwarding phase. GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
  • 2. EXISTING SYSTEM: Existing work on secure routing attempts to ensure that adversaries cannot cause path discovery to return an invalid network path, but Vampires do not disrupt or alter discovered paths, instead using existing valid network paths and protocol compliant messages. Protocols that maximize power efficiency are also inappropriate, since they rely on cooperative node behavior and cannot optimize out malicious action. DISADVANTAGES OF EXISTING SYSTEM:  Power outages  Due to Environmental disasters, loss in the information  Lost productivity  Various DOS attacks  Secure level is low  They do not address attacks that affect long-term availability. PROPOSED SYSTEM: This paper makes three primary contributions. First, we thoroughly evaluate the vulnerabilities of existing protocols to routing layer battery depletion attacks. We observe that security measures to prevent Vampire attacks are orthogonal to those used to protect routing infrastructure, and so existing secure routing protocols such as Ariadne, SAODV and SEAD do not protect against Vampire attacks. Existing work on secure routing attempts to ensure that adversaries cannot cause path discovery to return an invalid network path, but Vampires do not disrupt or alter discovered paths, instead using existing valid network paths and protocol- compliant messages. Protocols that maximize power efficiency are also inappropriate, since they rely on cooperative node behavior and cannot optimize out malicious action. Second, we show simulation results quantifying the performance of several representative protocols in the presence of a single Vampire (insider adversary). Third, we modify an existing sensor network routing protocol to provably bound the damage from Vampire attacks during packet forwarding.
  • 3. In proposed system we show simulation results quantifying the performance of several representative protocols in the presence of a single Vampire. Then, we modify an existing sensor network routing protocol to provably bound the damage from Vampire attacks during packet forwarding. ADVANTAGES OF PROPOSED SYSTEM:  Protect from the vampire attacks  Secure level is high  Boost up the Battery power SYSTEM CONFIGURATION:- HARDWARE CONFIGURATION:-  Processor - Pentium –IV  Speed - 1.1 Ghz  RAM - 256 MB(min)  Hard Disk - 20 GB  Key Board - Standard Windows Keyboard  Mouse - Two or Three Button Mouse  Monitor - SVGA SOFTWARE CONFIGURATION:-  Operating System : Windows XP  Programming Language : JAVA  Java Version : JDK 1.6 & above.  Database : MYSQL
  • 4. REFERENCE: Eugene Y. Vasserman and Nicholas Hopper “Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks”- IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 12, NO. 2, FEBRUARY 2013. DOMAIN: WIRELESS NETWORK PROJECTS